Sorry, the language specified is not available for this page

    Sungard AS Blog | //SECURITY AND COMPLIANCE

    How To Conduct An Information Security Gap Analysis

    One of the most critical tasks I have as an information security consultant is conducting a security gap analysis. This analysis provides a comparison of your security... Learn More

    How to prevent phishing attacks: Going beyond education

    At least 3.4 billion fake emails are sent every day as phishing attacks continue to grow and evolve into more sophisticated schemes. Cities, increasingly a target for... Learn More

    Updating your hardware and software: How to weigh the risks and rewards

    By Herb Schreib Microsoft will end extended support for SQL Server 2008 on July 9, 2019. For many organisations, that means the clock is running out and it’s time to... Learn More

    Three Steps to Comply with FIL-19-2019: Technology Service Provider Contracts

    A guide to help Financial Institutions and Technology Service Providers achieve their business continuity objectives By John Beattie In April 2019, the FDIC released ... Learn More

    How the cybersecurity talent shortage affects business resilience

    With the tech sector booming and unemployment low, cybersecurity talent can be hard to recruit and retain. The implications for business resilience are particularly... Learn More

    Critical Infrastructure Security and Resilience Month: Businesses can’t afford to overlook these security measures

    By Asher DeMetz The United States consists of 16 critical infrastructure sectors – communications, financial services, energy, emergency services, information... Learn More

    As the ATM hits 50, Cennox offers new lease on life

    When people turn 50, they sometimes do unusual things to celebrate the event. The Huffington Post published a list of things everyone should experience at least once... Learn More

    XRS Embraces New Data Protection Law

    Earlier this summer the GDPR, or General Data Protection Regulation, superseded the European Data Protection Directive (EDPD) to become the new keystone of data... Learn More

    IT security cartoon: Why humans are cybersecurity’s biggest adversary

    What is the price of network security? If your company understands we live in an interconnected world where cyber threats are continuously growing and developing, no... Learn More

    Cybersecurity myths you should stop telling yourself

    By Nick Bianco Cybersecurity can be a magnet for myths. Attacks emerge and cripple systems availability or swipe data quickly and unexpectedly. It happens so fast that... Learn More

    Data breach response: 4 ways the most resilient businesses handle hacks

    Sandra Bell Data breaches can trigger fines, deflate stock prices, irreparably damage reputations, lose customers and attract more cyberattacks. But they don’t have to. Learn More

    Do you know which of these 7 cyberattacks isn’t real?

    When CentaurWipe infected hundreds of companies in December 2016, IT departments were left flat-footed. Named for its dual attack of locking down devices while... Learn More
    x

    SUBSCRIBE TO OUR BLOG

    Advice, stories, and expertise about work life today.

    x

    THANK YOU!

    We know your inbox is protected space, so we promise to send only the good stuff, twice a month.